Cryptographers' World
 

Lars R. Knudsen


Author's Web Page Link

56 papers in database with 2760 citations StarStarStar

Editor of 2 conference proceedings books

H-number: 26

Conference Proceedings

 
1. Lars R. Knudsen, editor, Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings. Springer, 2002. ISBN 3-540-43553-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Lars R. Knudsen, editor, Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings. Springer, 1999. ISBN 3-540-66226-X.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Lars R. Knudsen,  Chris J. Mitchell,  Partial Key Recovery Attack Against RMAC, Journal of Cryptology, Volume 18(4), pp. 375 - 389, Springer, 2005.

[Cited 6 times ]

2. Lars R. Knudsen,  The Security of Feistel Ciphers with Six Rounds or Less, Journal of Cryptology, Volume 15(3), pp. 207 - 222, Springer, 2002.

[Cited 8 times ]

3. Eli Biham,  Lars R. Knudsen,  Cryptanalysis of the ANSI X9.52 CBCM Mode, Journal of Cryptology, Volume 15(1), pp. 47 - 59, Springer, 2002.

[Cited 12 times ]

4. Joan Daemen,  Lars R. Knudsen,  Vincent Rijmen,  Linear Frameworks for Block Ciphers, Designs, Codes and Cryptography, Volume 22(1), pp. 65 - 87, Springer, 2001.

[Electronic Edition][Cited 16 times ]

5. Thomas Jakobsen,  Lars R. Knudsen,  Attacks on Block Ciphers of Low Algebraic Degree, Journal of Cryptology, Volume 14(3), pp. 197 - 210, Springer, 2001.

[Cited 20 times ]

6. Lars R. Knudsen,  A Detailed Analysis of SAFER K, Journal of Cryptology, Volume 13(4), pp. 417 - 436, Springer, 2000.

[Cited 13 times ]

7. Ivan Damgard,  Lars R. Knudsen,  Two-Key Triple Encryption, Journal of Cryptology, Volume 11(3), pp. 209 - 218, Springer, 1998.

[Cited 42 times ]

8. Lars R. Knudsen,  Xuejia Lai,  Bart Preneel,  Attacks on Fast Double Block Length Hash Functions, Journal of Cryptology, Volume 11(1), pp. 59 - 72, Springer, 1998.

[Cited 57 times Red Star]

9. Kaisa Nyberg,  Lars R. Knudsen,  Provable Security Against a Differential Attack, Journal of Cryptology, Volume 8(1), pp. 27 - 37, Springer, 1995.

[Cited 101 times Red StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Julia Borghoff,  Lars R. Knudsen,  Gregor Leander,  Krystian Matusiewicz,  Cryptanalysis of C2, pp. 250 - 266, CRYPTO 2009.

[Electronic Edition][Cited 1 times ]

2. Lars R. Knudsen,  Florian Mendel,  Christian Rechberger,  Søren S. Thomsen,  Cryptanalysis of MDC-2, pp. 106 - 120, EUROCRYPT 2009.

[Electronic Edition][Cited 2 times ]

3. Praveen Gauravaram,  Lars R. Knudsen,  On Randomizing Hash Functions to Strengthen the Security of Digital Signatures, pp. 88 - 105, EUROCRYPT 2009.

[Electronic Edition][Cited 3 times ]

4. Ivan Damgard,  Lars R. Knudsen,  Søren S. Thomsen,  Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography, pp. 144 - 155, ACNS 2008.

[Electronic Edition][Cited 2 times ]

5. Lars R. Knudsen,  Christian Rechberger,  Søren S. Thomsen,  The Grindahl Hash Functions, pp. 39 - 57, FSE 2007.

[Electronic Edition][Cited 42 times ]

6. Matthew Henricksen,  Lars R. Knudsen,  Cryptanalysis of the CRUSH Hash Function, pp. 74 - 83, SAC 2007.

[Electronic Edition][No citation]

7. Andrey Bogdanov,  Lars R. Knudsen,  Gregor Leander,  Christof Paar,  Axel Poschmann,  Matthew J. B. Robshaw,  Yannick Seurin,  C. Vikkelsoe,  PRESENT: An Ultra-Lightweight Block Cipher, pp. 450 - 466, CHES 2007.

[Electronic Edition][Cited 138 times Red StarRed Star]

8. Lars R. Knudsen,  Vincent Rijmen,  Known-Key Distinguishers for Some Block Ciphers, pp. 315 - 324, ASIACRYPT 2007.

[Electronic Edition][Cited 30 times ]

9. Lars R. Knudsen,  Frédéric Muller,  Some Attacks Against a Double Length Hash Proposal, pp. 462 - 473, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

10. Lars R. Knudsen,  SMASH - A Cryptographic Hash Function, pp. 228 - 242, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

11. Lars R. Knudsen,  John Erik Mathiassen,  Preimage and Collision Attacks on MD2, pp. 255 - 267, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

12. Lars R. Knudsen,  Tadayoshi Kohno,  Analysis of RMAC, pp. 182 - 191, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 15 times ]

13. Lars R. Knudsen,  David Wagner,  Integral Cryptanalysis, pp. 112 - 127, FSE 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 122 times Red StarRed Star]

14. Mihir Bellare,  Alexandra Boldyreva,  Lars R. Knudsen,  Chanathip Namprempre,  Online Ciphers and the Hash-CBC Construction, pp. 292 - 309, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

15. HÃ¥vard Raddum,  Lars R. Knudsen,  A Differential Attack on Reduced-Round SC2000, pp. 190 - 198, SAC 2001.

[Electronic Edition][Cited 3 times ]

16. Helena Handschuh,  Lars R. Knudsen,  Matthew J. B. Robshaw,  Analysis of SHA-1 in Encryption Mode, pp. 70 - 83, CT-RSA 2001.

[Electronic Edition][Cited 32 times ]

17. Don Coppersmith,  Lars R. Knudsen,  Chris J. Mitchell,  Key Recovery and Forgery Attacks on the MacDES MAC Algorithm, pp. 184 - 196, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

18. Lars R. Knudsen,  Willi Meier,  Correlations in RC6 with a Reduced Number of Rounds, pp. 94 - 108, FSE 2000.

[Electronic Edition][Cited 44 times ]

19. Lars R. Knudsen,  John Erik Mathiassen,  A Chosen-Plaintext Linear Attack on DES, pp. 262 - 272, FSE 2000.

[Electronic Edition][Cited 38 times ]

20. Lars R. Knudsen,  Matthew J. B. Robshaw,  David Wagner,  Truncated Differentials and Skipjack, pp. 165 - 180, CRYPTO 1999.

[Electronic Edition][Cited 30 times ]

21. Lars R. Knudsen,  Vincent Rijmen,  On the Decorrelated Fast Cipher (DFC) and Its Theory, pp. 81 - 94, FSE 1999.

[Electronic Edition][Cited 22 times ]

22. Lars R. Knudsen,  Willi Meier,  Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem, pp. 363 - 374, EUROCRYPT 1999.

[Electronic Edition][Cited 20 times ]

23. Lars R. Knudsen,  Willi Meier,  Bart Preneel,  Vincent Rijmen,  Sven Verdoolaege,  Analysis Methods for (Alleged) RC4, pp. 327 - 341, ASIACRYPT 1998.

[Electronic Edition][Cited 91 times Red Star]

24. Eli Biham,  Lars R. Knudsen,  Cryptanalysis of the ANSI X9.52 CBCM Mode, pp. 100 - 111, EUROCRYPT 1998.

[Electronic Edition][Cited 11 times ]

25. Bart Van Rompay,  Lars R. Knudsen,  Vincent Rijmen,  Differential Cryptanalysis of the ICE Encryption Algorithm, pp. 270 - 283, FSE 1998.

[Electronic Edition][Cited 14 times ]

26. Lars R. Knudsen,  Vincent Rijmen,  Ronald L. Rivest,  Matthew J. B. Robshaw,  On the Design and Security of RC2, pp. 206 - 221, FSE 1998.

[Electronic Edition][Cited 17 times ]

27. Eli Biham,  Ross J. Anderson,  Lars R. Knudsen,  Serpent: A New Block Cipher Proposal, pp. 222 - 238, FSE 1998.

[Electronic Edition][Cited 81 times Red Star]

28. Lars R. Knudsen,  Bart Preneel,  Fast and Secure Hashing Based on Codes, pp. 485 - 498, CRYPTO 1997.

[Electronic Edition][Cited 37 times ]

29. Johan Borst,  Lars R. Knudsen,  Vincent Rijmen,  Two Attacks on Reduced IDEA, pp. 1 - 13, EUROCRYPT 1997.

[Electronic Edition][Cited 41 times ]

30. Thomas Jakobsen,  Lars R. Knudsen,  The Interpolation Attack on Block Ciphers, pp. 28 - 40, FSE 1997.

[Electronic Edition][Cited 241 times Red StarRed Star]

31. Joan Daemen,  Lars R. Knudsen,  Vincent Rijmen,  The Block Cipher Square, pp. 149 - 165, FSE 1997.

[Electronic Edition][Cited 340 times Red StarRed StarRed Star]

32. Lars R. Knudsen,  Bart Preneel,  Hash Functions Based on Block Ciphers and Quaternary Codes, pp. 77 - 90, ASIACRYPT 1996.

[Electronic Edition][Cited 23 times ]

33. Lars R. Knudsen,  Willi Meier,  Improved Differential Attacks on RC5, pp. 216 - 228, CRYPTO 1996.

[Electronic Edition][Cited 60 times Red Star]

34. Lars R. Knudsen,  Torben P. Pedersen,  On the Difficulty of Software Key Escrow, pp. 237 - 244, EUROCRYPT 1996.

[Electronic Edition][Cited 24 times ]

35. Lars R. Knudsen,  Matthew J. B. Robshaw,  Non-Linear Approximations in Linear Cryptanalysis, pp. 224 - 236, EUROCRYPT 1996.

[Electronic Edition][Cited 93 times Red Star]

36. Lars R. Knudsen,  Thomas A. Berson,  Truncated Differentials of SAFER, pp. 15 - 26, FSE 1996.

[Electronic Edition][Cited 65 times Red Star]

37. Lars R. Knudsen,  A Key-schedule Weakness in SAFER K-64, pp. 274 - 286, CRYPTO 1995.

[Electronic Edition][Cited 48 times ]

38. Lars R. Knudsen,  Truncated and Higher Order Differentials, pp. 196 - 211, FSE 1994.

[Electronic Edition][Cited 314 times Red StarRed StarRed Star]

39. Lars R. Knudsen,  New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract), pp. 419 - 424, EUROCRYPT 1994.

[Electronic Edition][Cited 1 times ]

40. Lars R. Knudsen,  Xuejia Lai,  New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM, pp. 410 - 418, EUROCRYPT 1994.

[Electronic Edition][Cited 18 times ]

41. Xuejia Lai,  Lars R. Knudsen,  Attacks on Double Block Length Hash Functions, pp. 157 - 165, FSE 1993.

[Electronic Edition][Cited 11 times ]

42. Lars R. Knudsen,  Practically Secure Feistel Ciphers, pp. 211 - 221, FSE 1993.

[Electronic Edition][Cited 61 times Red Star]

43. Ivan Damgard,  Lars R. Knudsen,  The Breaking of the AR Hash Function, pp. 286 - 292, EUROCRYPT 1993.

[Electronic Edition][Cited 9 times ]

44. Lars R. Knudsen,  Cryptanalysis of LOKI91, pp. 196 - 208, ASIACRYPT 1992.

[Electronic Edition][Cited 75 times Red Star]

45. Kaisa Nyberg,  Lars R. Knudsen,  Provable Security Against Differential Cryptanalysis, pp. 566 - 574, CRYPTO 1992.

[Electronic Edition][Cited 146 times Red StarRed Star]

46. Lars R. Knudsen,  Iterative Characteristics of DES and s²-DES, pp. 497 - 511, CRYPTO 1992.

[Electronic Edition][Cited 3 times ]

47. Lars R. Knudsen,  Cryptanalysis of LOKI, pp. 22 - 35, ASIACRYPT 1991.

[Electronic Edition][Cited 35 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...